- Security Center
- English ▾
- Contact Us
Lavasoft Malware Labs Blog
Secure Your PC
The system registry is a database of essential file references to applications and utilities. Its structure is hierarchical. The registry is structured with nodes of information that contain keys and sub-keys.
To access the System Registry is quite easy.
Do not make any changes until you have done a backup of the Registry. If any incorrect change, you may not boot your OS.
When it comes to securing your PC, be sure to enable a firewall. A firewall is used to prevent unwanted connections being made to your PC. Malware, such a worms, can scan a machine to see if certain ports are open and if so will attempt to access your machine via those open ports.
Windows comes pre-installed with a basic firewall and while you can’t configure it too much, it’s certainly worthwhile making sure that it’s enabled.
Microsoft periodically release security updates for Windows. These security updates fix recently discovered security flaws. As you would expect, it’s a good idea to install the latest security fixes as soon as they become available.
Temporary Internet Files is a folder on Microsoft Windows which contains Web page content that is stored on your hard disk. Internet Explorer and other web browsers uses this directory to cache pages and other multimedia content, such as video and audio files, from websites you visit. This feature improves network performance allowing such websites to load more quickly the next time you visit them.
To clean the Temporary Internet Files folder, proceed through the steps listed below:
ActiveX controls called add-ons are small programs which are used on the Internet. They can enhance your browsing experience by allowing animation or they can help with tasks such as installing security updates at Microsoft Update.
The Task Manager provides detailed information about computer performance and running applications, processes and CPU usage, commit charge and memory information, network activity and statistics, logged-in users, and system services.
You can use the Task Manager to end a process.
To open the Task Manager, do one of the following:
- right-click the taskbar and then click Task Manager
– or –
Malware Removal Support Blog is now enabled.